Vault Vulnerability: Authenticated Users Can Trigger DoS via Path Glob Policy
The National Vulnerability Database has disclosed CVE-2026-3605, a high-severity vulnerability (CVSS 8.1) impacting HashiCorp Vault Community and Enterprise editions. This isn’t a remote code execution or data exfiltration flaw, but it’s a critical denial-of-service vector that demands immediate attention from anyone running Vault.
Specifically, an authenticated user with access to a kvv2 path, governed by a policy containing a glob (*), can delete secrets they were not explicitly authorized to read or write. This is a classic authorization bypass, even if it’s limited in scope. While it doesn’t allow cross-namespace deletion or secret data exfiltration, the ability to arbitrarily delete secrets within an authorized path is disastrous for operational integrity.
Think about the attacker’s calculus here. They don’t need to exfiltrate data to cause chaos. A well-placed deletion of critical secrets – API keys, database credentials, certificates – can bring down entire applications, services, or even infrastructure. This isn’t about data theft; it’s about operational disruption and integrity compromise.
For CISOs and security architects, this highlights the perennial challenge of managing granular permissions, especially with dynamic secrets and infrastructure-as-code. Glob policies are convenient, but they introduce complexity that can easily lead to unintended authorization boundaries. This vulnerability is a stark reminder that convenience often comes with a security cost.
Defenders need to understand that an attacker, once authenticated, doesn’t need elevated privileges to exploit this. A standard user account, if its policy is misconfigured with a glob on a kvv2 path, becomes a weapon. This underscores the importance of least privilege principles and rigorous policy review, particularly in highly sensitive systems like secret managers.
The fix is available in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0, 1.21.5, 1.20.10, and 1.19.16. If you’re running any earlier version, you are exposed. This isn’t a vulnerability to defer patching on; the potential for catastrophic service disruption is too high.
What This Means For You
- If your organization uses HashiCorp Vault, immediately identify all instances and their versions. **Prioritize patching to Vault Community Edition 2.0.0 or Vault Enterprise 2.0.0, 1.21.5, 1.20.10, or 1.19.16.** After patching, audit your Vault policies, specifically looking for `kvv2` paths with glob characters (`*`) that grant deletion capabilities to authenticated users. Revoke or refine any overly permissive policies that could allow unauthorized secret deletion.
Related ATT&CK Techniques
🛡️ Detection Rules
1 rules · 6 SIEM formats1 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.
Exploitation Attempt — CVE-2026-3605
Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.
1 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get All SIEM Formats →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-3605 | Privilege Escalation | HashiCorp Vault Community Edition < 2.0.0 |
| CVE-2026-3605 | Privilege Escalation | HashiCorp Vault Enterprise < 2.0.0 |
| CVE-2026-3605 | Privilege Escalation | HashiCorp Vault Enterprise 1.21.x < 1.21.5 |
| CVE-2026-3605 | Privilege Escalation | HashiCorp Vault Enterprise 1.20.x < 1.20.10 |
| CVE-2026-3605 | Privilege Escalation | HashiCorp Vault Enterprise 1.19.x < 1.19.16 |